Development of a framework to leverage knowledge management systems to improve security awareness.

[1]  H. D. Thomas,et al.  SUCCESSFUL KNOWLEDGE MANAGEMENT PROJECTS , 1998 .

[2]  Nassim Belbaly,et al.  Corporate Portal: A Tool for Knowledge Management Synchronization , 2004, Int. J. Inf. Manag..

[3]  Klaus Tochtermann,et al.  I-KNOW What You Will Know in Knowledge Management , 2004, PAKM.

[4]  Anat Hovav,et al.  Deterring internal information systems misuse , 2007, CACM.

[5]  Mark B. Desman Building an Information Security Awareness Program , 2001 .

[6]  Iván Arce,et al.  The Weakest Link Revisited , 2003, IEEE Secur. Priv..

[7]  P. Senge THE FIFTH DISCIPLINE , 1997 .

[8]  Angela Sasse,et al.  Humans in the Loop Human – Computer Interaction and Security , 2022 .

[9]  Ricardo de Almeida Falbo,et al.  Integrating Knowledge Management and Groupware in a Software Development Environment , 2004, PAKM.

[10]  A. Gupta,et al.  The first decade of personal computers , 1984, Proceedings of the IEEE.

[11]  J. Schweitzer Security awareness , 1986, PCS '86.

[12]  D. Stenmark Information vs. knowledge: the role of intranets in knowledge management , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[13]  G. T. Gangemi,et al.  Computer Security Basics , 2006 .

[14]  Gustavo Stubrich The Fifth Discipline: The Art and Practice of the Learning Organization , 1993 .

[15]  B. Burmahl The big picture. , 2000, Health facilities management.

[16]  Sebastiaan H. von Solms,et al.  Information Security - The Third Wave? , 2000, Comput. Secur..

[17]  Andrian Marcus,et al.  Data Cleansing: Beyond Integrity Analysis 1 , 2000 .

[18]  Eugene Schultz,et al.  Incident Response: A Strategic Guide to Handling System and Network Security Breaches , 2001 .

[19]  Robert Schifreen Defeating the hacker : a non-technical introduction to computer security , 2006 .

[20]  Brian Contos Column: Insider threat monitoring is enhanced by asset relevance , 2007 .

[21]  Confidentiality and security of clinical information in mental health practice , 2002 .

[22]  Stephanie Teufel,et al.  Analyzing information security culture: increased trust by an appropriate information security culture , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[23]  Amanda Andress,et al.  Surviving Security: How to Integrate People, Process, and Technology, Second Edition , 2001 .

[24]  Mike Kemp Insider Attacks: Barbarians inside the gates: addressing internal security threats , 2005 .

[25]  Diane M. Strong,et al.  AIMQ: a methodology for information quality assessment , 2002, Inf. Manag..

[26]  E. Eugene Schultz A framework for understanding and predicting insider attacks , 2002, Comput. Secur..

[27]  Julie D Nosworthy,et al.  Implementing Information Security In The 21st Century Do You Have the Balancing Factors? , 2000, Comput. Secur..

[28]  Norbert Gronau,et al.  The KMDL Knowledge Management Approach: Integrating Knowledge Conversions and Business Process Modeling , 2004, PAKM.

[29]  A. B. Ruighaver,et al.  Understanding Organizational Security Culture , 2002 .

[30]  野中 郁次郎,et al.  The Knowledge-Creating Company: How , 1995 .

[31]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[32]  Verna Allee,et al.  12 Principles of Knowledge Management. , 1997 .

[33]  Mathieu Gorge,et al.  Cyberterrorism: hype or reality? , 2007 .

[34]  Robert S. Swarz,et al.  Reliable Computer Systems: Design and Evaluation , 1992 .

[35]  Jeffrey M. Stanton,et al.  Analysis of end user security behaviors , 2005, Comput. Secur..

[36]  Stefan A. Robila,et al.  Don't be a phish: steps in user education , 2006, ITICSE '06.

[37]  Gurpreet Dhillon,et al.  Managing and controlling computer misuse , 1999, Inf. Manag. Comput. Secur..

[38]  Daniel E. O'Leary Wikis: 'From Each According to His Knowledge' , 2008, Computer.

[39]  Ebrahim Randeree,et al.  Knowledge management: securing the future , 2006, J. Knowl. Manag..

[40]  John Denton Organisational learning and effectiveness , 1998 .

[41]  Mani R. Subramani,et al.  A framework of knowledge management systems: issues and challenges for theory and practice , 2000, ICIS.

[42]  Peter G. King Thanks Very Much , 1993 .

[43]  Lech J. Janczewski,et al.  Managerial guide for handling cyber-terrorism and information warfare , 2005 .

[44]  Satish Gupta,et al.  Personal Computer Displays , 1987, IEEE Computer Graphics and Applications.

[45]  Atreyi Kankanhalli,et al.  The role of IT in successful knowledge management initiatives , 2003, CACM.

[46]  W. Keith Edwards,et al.  Talc: using desktop graffiti to fight software vulnerability , 2008, CHI.

[47]  Mark Wilson,et al.  SP 800-16. Information Technology Security Training Requirements: a Role- and Performance-Based Model , 1998 .

[48]  R. Sharp,et al.  Internet Safety and Security Surveys - A Review , 2007 .

[49]  Alea M. Fairchild Knowledge management metrics via a balanced scorecard methodology , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[50]  M. Crossan The Knowledge-Creating Company: How Japanese Companies Create the Dynamics of Innovation , 1996 .

[51]  I. Nonaka A Dynamic Theory of Organizational Knowledge Creation , 1994 .

[52]  Kostas N. Dervitsiotis,et al.  The challenge of managing organizational change: Exploring the relationship of re-engineering, developing learning organizations and total quality management , 1998 .

[53]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[54]  W. Kim,et al.  Fair process: managing in the knowledge economy. , 1997, Harvard business review.

[55]  R. McDermott Why Information Technology Inspired but Cannot Deliver Knowledge Management , 1999 .

[56]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[57]  David C. Mowery,et al.  Is the Internet a US invention?—an economic and technological history of computer networking , 2002 .

[58]  Morten T. Hansen,et al.  What's your strategy for managing knowledge? , 1999, Harvard business review.

[59]  George Kurtz,et al.  Hacking Exposed: Network Security Secrets & Solutions , 1999 .

[60]  Denis Trcek Security Models: Refocusing on the Human Factor , 2006, Computer.

[61]  Alan D. Marwick,et al.  Knowledge management technology , 2001, IBM Syst. J..

[62]  Jean-Grégoire Bernard A Typology of Knowledge Management System Use by Teams , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[63]  Rebecca Herold,et al.  Managing an Information Security and Privacy Awareness and Training Program, Second Edition , 2010 .

[64]  M. Siegler,et al.  Sounding Boards. Confidentiality in medicine--a decrepit concept. , 1982, The New England journal of medicine.

[65]  Dorothy E. Leidner,et al.  Knowledge Management Systems: Issues, Challenges, and Benefits , 1999, Commun. Assoc. Inf. Syst..

[66]  Joan Hash,et al.  Building an Information Technology Security Awareness and Training Program , 2003 .

[67]  M. Lynne Markus,et al.  Toward A Theory of Knowledge Reuse : Types of Knowledge Reuse Situations and Factors in Reuse Success , 2022 .

[68]  Scott McCoy,et al.  The most important issues in knowledge management , 2002, CACM.

[69]  Salvatore J. Stolfo,et al.  Addressing the Insider Threat , 2009, IEEE Security & Privacy Magazine.

[70]  Andrian Marcus,et al.  Data Cleansing: Beyond Integrity Analysis , 2000, IQ.

[71]  Yogesh Malhotra,et al.  Integrating knowledge management technologies in organizational business processes: getting real time enterprises to deliver real business performance , 2005, J. Knowl. Manag..

[72]  Josephine Chinying Lang,et al.  Managerial concerns in knowledge management , 2001, J. Knowl. Manag..

[73]  Myra Spiliopoulou,et al.  Towards an Evaluation Framework for Knowledge Management Systems , 2004, PAKM.

[74]  Etienne Wenger,et al.  Situated Learning: Legitimate Peripheral Participation , 1991 .

[75]  Lorrie Faith Cranor,et al.  Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.